Communications and Multimedia Security Issues of the New Century
Home > Computing and Information Technology > Computer security > Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany(64 IFIP Advances in Information and Communication Technology)
Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany(64 IFIP Advances in Information and Communication Technology)

Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany(64 IFIP Advances in Information and Communication Technology)


     0     
5
4
3
2
1



International Edition


X
About the Book

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e­ commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.

Table of Contents:
Web Security.- What You See Is What You Sign —Trustworthy Display of XML Documents for Signing and Verification.- XML Electronic Signatures.- An integrated secure Web architecture for protected Mobile code distribution.- Secure and anonymous multicast framework.- Vulnerabilities and Security Limitations of current IP Telephony Systems.- Watermarking I.- Quantization Watermarking in the JPEG2000 Coding Pipeline.- Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences.- Scalable Detection of Perceptual Watermarks in JPEG2000 Images.- Cryptographic Algorithms.- Collecting randomness from the net.- Encryption System Based on Neutral Network.- A Modified Chaotic Cryptographic Method.- An Elliptic Curve Random Number Generator.- Watermarking II.- Conditional and User Specific Access to Services and Resources Using Annotation Watermarks.- Large Scale distributed watermarking of multicast media through encryption.- Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept.- Fingerprints for Copyright Protection.- System Security.- Software Security Assessment through Specification Mutations and Fault Injection.- Asynchronous Large-Scale Certification Based on Certificate Verification Trees.- ACLA: A Framework for Access Control List (ACL) Analysis and Optimization.- Transparent Access To Encrypted Data Using Operating System Network Stack Extensions.- A PC Cryptographic Coprocessor Based on TI Signal Processor And Smart Card System.- Watermarking III.- Optimization of Watermarking Performances Using Error Correcting Codes and Repetition.- Using Raw Speech as a Watermark, does it work?.- Multiple Security Aspects.- Transferability in Coin Systems with Observers.- Secure iLearning.- Tree-based Multicast KeyAgreement.- Security for the core network of third generation mobile systems.- Secure Internet Phone.- Posters.- Secure Meeting Scheduling with AgenTa.- Virtual Hidden Network.- Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval.- A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks.- Secure Service Centered Networking for Nomadic Usage.- Last Minute Papers.- A Secure Authentication Infrastructure for Mobile Communication Services over the Internet.- Blind Compressed-Domain Watermarking for MPEG-encoded Videos.- Index of Contributors.


Best Sellers


Product Details
  • ISBN-13: 9781475748116
  • Publisher: Springer-Verlag New York Inc.
  • Publisher Imprint: Springer-Verlag New York Inc.
  • Height: 235 mm
  • No of Pages: 432
  • Returnable: N
  • Sub Title: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany
  • ISBN-10: 1475748116
  • Publisher Date: 22 Jan 2013
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Series Title: 64 IFIP Advances in Information and Communication Technology
  • Width: 155 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany(64 IFIP Advances in Information and Communication Technology)
Springer-Verlag New York Inc. -
Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany(64 IFIP Advances in Information and Communication Technology)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany(64 IFIP Advances in Information and Communication Technology)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!